ryantig / grepcidrLinks
grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitrary networks. Instead should star/fork the current rev from orignial dev https://github.com/jrlevine/grepcidr3
☆37Updated 2 years ago
Alternatives and similar repositories for grepcidr
Users that are interested in grepcidr are comparing it to the libraries listed below
Sorting:
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆88Updated last year
- from http://www.pc-tools.net/unix/grepcidr/☆90Updated 8 years ago
- ☆41Updated last month
- ssh jump host appliance☆26Updated 3 years ago
- DNS Shotgun: high-performance realistic DNS benchmarking tool. This is a mirrored repository.☆50Updated last month
- A simple, POSIX shell script to check sysctl values against a predefined reference file.☆20Updated last year
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated 3 months ago
- egrets monitors egress☆46Updated 5 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- ☆42Updated 2 years ago
- Just random things some might find useful☆21Updated last week
- Provides an overview of the inner file structure of a PDF☆24Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- VulsRepo is visualized based on the json report output in vuls.☆36Updated 4 years ago
- Fast syncronization across networks using speedy compression, lots of parallelization and fast hashmaps for keeping track of things inter…☆96Updated 4 months ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 3 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 8 years ago
- Improves Ubuntu security feed compatibility allowing it to be consumed by Debian vulnerability report tool, debsecan.☆12Updated 4 years ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Updated last week
- DNS Firewall Enforcer☆50Updated 6 years ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆74Updated 2 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 3 years ago
- High performance search for IP addresses and CIDR ranges☆32Updated 6 months ago
- Security Alert Decoration☆27Updated 5 months ago
- Source code and examples for Antignis☆44Updated 3 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- Modified cryptsetup to enable password guessing - https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases☆17Updated 6 years ago